Changing Perceptions Of Large And Complex Investigations

Changing Perceptions of Large and Complex Investigations The perception of what constitutes a “large and complex” investigation has evolved dramatically over the decades. One of the most illustrative examples of this evolution is the Yorkshire Ripper case from the late… Read more

How Detego’s Latest Features are Empowering ICAC Investigators

As a seasoned Internet Crimes Against Children (ICAC) investigator with years of experience in conducting investigations and training law enforcement teams, I have witnessed firsthand the challenges that come with combating the exploitation of our most vulnerable population – our… Read more

From FileVault To T2: How To Deal With Native Apple Encryption

While Apple’s commitment to user privacy and security remains their priority, the field of computer forensics faces a solid challenge when it comes to extracting evidence from encrypted Apple devices. This article provides comprehensive insights into Apple’s native encryption, covering… Read more

Digital Forensics Education, Certification And Training Guide

University Programs Digital forensics training is available in various formats, each with its unique merits and challenges. University programs are one option, offering both undergraduate and postgraduate courses that cater to different levels of expertise and career aspirations. Undergraduate These… Read more

OSAC And Standards In The Digital Evidence World

by Steve Johnson AI CLPE, CFA, Standards Ambassador – Organization of Scientific Area Committees (OSAC) for Forensic Science In 1998, as the personal computer and cell phone industry was starting to explode, the Scientific Working Group for Digital Evidence (SWGDE)… Read more

Targeted Collections: Balancing Legal Precision And Data Privacy

In this installment of our series exploring the transformative power of Software-as-a-Service (SaaS) architecture in the legal landscape, we delve deep into the art of targeted collections. This crucial component of modern legal data management not only complements our previous… Read more

The Pitfalls Of Relying On iTunes Backups For Investigations

In the realm of mobile forensics, iTunes backups have long been a common method for extracting data from iOS devices. However, the increasing sophistication of mobile devices and the evolving landscape of digital evidence have exposed the limitations of iTunes… Read more

The Evolution Of E-Crime: From Hacking To Cyberwarfare

The dawn of the digital age brought with it a new breed of criminal – the cybercriminal. As computers and the internet became more ubiquitous in business and personal life, those with malicious intents saw opportunities to exploit these new… Read more

How To Use The Macroblocks Filter In Amped FIVE

In this latest article, David Spreadborough, a Forensic Analyst at Amped Software, looks at why compression is a factor when analyzing video before giving us a run-through of the Macroblocks filter in Amped FIVE. Read on to learn more. You… Read more

How To Screenshot Mobile Evidence With Mobile Device Investigator 

Cell phones are used for communication, entertainment, and even as essential tools for work. With the widespread usage of smartphones, law enforcement, and digital forensics professionals have recognized the significance of capturing digital evidence from these devices. By taking screenshots,… Read more

Extracting Google Chrome Using Android Agent

Hey there everyone. It’s Ryan from your Oxygen Forensics training team, and today what we’re going to discuss is using our Android agent to collect Google Chrome data as a third party app on our Android devices. This is going… Read more